Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)最新文献

筛选
英文 中文
Analysis of a distributed algorithm to determine multiple routes with path diversity in ad hoc networks ad hoc网络中具有路径分集的多路由的分布式算法分析
Stephen Mueller, D. Ghosal
{"title":"Analysis of a distributed algorithm to determine multiple routes with path diversity in ad hoc networks","authors":"Stephen Mueller, D. Ghosal","doi":"10.1109/WIOPT.2005.12","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.12","url":null,"abstract":"With multipath routing in mobile ad hoc networks (MANETs), a source can establish multiple routes to a destination for routing data. In MANETs, multipath routing can be used to provide route resilience, smaller end-to-end delay, and better load balancing. However, when the multiple paths are close together, transmissions of different paths may interfere with each other, causing degradation in performance. Besides interference, the physical diversity of paths also improves fault tolerance. We present a purely distributed multipath protocol based on the AODV-multipath (AODVM) protocol called AODVM with path diversity (AODVM/PD) that finds multiple paths with a desired degree of correlation between paths specified as an input parameter to the algorithm. We demonstrate through detailed simulation analysis that multiple paths with low degree of correlation determined by AODVM/PD provides both smaller end-to-end delay than AODVM in networks with low mobility and better route resilience in the presence of correlated node failures.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"637 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116412246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
A novel call admission control in multi-service wireless LANs 一种新的多业务无线局域网呼叫接纳控制
Danyan Chen, A. Elhakeem, Xiaofeng Wang
{"title":"A novel call admission control in multi-service wireless LANs","authors":"Danyan Chen, A. Elhakeem, Xiaofeng Wang","doi":"10.1109/WIOPT.2005.4","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.4","url":null,"abstract":"A call admission control algorithm must try to admit as many calls as possible provided that their quality of service (QoS) requirements can be met without violating those of previously admitted calls. In this paper, we propose a simple and effective call admission control algorithm and its associated resource allocation mechanism ,referred to as the flexible call admission control, for recently proposed multi-pattern (MP) wireless local area networks (WLANs). The proposed flexible call admission control effectively takes the advantages of flexible pattern assignment in MP WLANs and the rate-adaptive feature of multimedia services to support multiple classes of traffic with diverse QoS requirements and priority levels. With the use of an innovative performance estimation mechanism, the proposed flexible call admission control and resource allocation algorithm has considerably lower complexity than that of the existing schemes. Simulation results have demonstrated that the use of MP FAC provides much higher system throughput and lower call blocking probability. It should be emphasized that the proposed FAC, although designed for MP WLANs, also works well with existing standard WLANs.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126150061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mobility prediction's influence on QoS in wireless networks: a study on a call admission algorithm 移动预测对无线网络QoS的影响:一种呼叫接纳算法的研究
J. François, G. Leduc
{"title":"Mobility prediction's influence on QoS in wireless networks: a study on a call admission algorithm","authors":"J. François, G. Leduc","doi":"10.1109/WIOPT.2005.29","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.29","url":null,"abstract":"Several mechanisms increase the QoS level of mobile networks thanks to an underlying mobility prediction method (i.e. a means to predict a mobile's next access router). This paper aims at studying how the accuracy of the prediction method can influence the network QoS in the particular context of call admission control. It shows that (a) the mobiles behaviour must be adapted according to the prediction scheme accuracy in order to achieve good performance and (b) the admission algorithm can be modified to increase its fairness and to give mobiles an incentive to do such an adaptation.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134273292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
k-server optimal task scheduling problem with convex cost function 具有凸代价函数的k-服务器最优任务调度问题
Mingjie Lin, Yaling Ma
{"title":"k-server optimal task scheduling problem with convex cost function","authors":"Mingjie Lin, Yaling Ma","doi":"10.1109/WIOPT.2005.25","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.25","url":null,"abstract":"We consider a class of k-server optimal task scheduling problems partitioning and scheduling N tasks with various real-time constrains and work loads on k servers with convex task processing cost function so as to minimize the total task processing cost while still guaranteeing satisfaction of all time constraints. This class has broad expressing power for practical scheduling problems in several areas such as real-time multimedia wireless transmission , CPU energy conservation, and warehouse order processing management, et. al. Our formulation is quite general such that most previous works can be readily reduced to a special case of the presented k-server optimal task scheduling problem. We show that, when k = 1, optimal solution can be obtained in computational complexity of O(N) and the corresponding optimal scheduling problem is equivalent to finding the shortest 2D Euclidean distance between two vertices inside a well-defined 2D polygon. However, when k 2, the optimal scheduling problem can be demonstrated to be NP-hard by reducing it to a well-known NP-complete bin-packing problem. Therefore, we conclude no polynomial time algorithm exists for a general k-server optimal task scheduling problem. We then construct approximation algorithms to solve the presented k-server problem in a practical way and illustrate its performance by simulation results and analysis.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127124588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power control and multiuser diversity in multiple access channels with two time-scale fading 双时标衰落下多址信道的功率控制与多用户分集
Alex S. C. Leong, J. Evans, S. Dey
{"title":"Power control and multiuser diversity in multiple access channels with two time-scale fading","authors":"Alex S. C. Leong, J. Evans, S. Dey","doi":"10.1109/WIOPT.2005.40","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.40","url":null,"abstract":"We derive the optimal power control strategy to maximize the sum rate of a multiple access channel with two time-scale fading, where transmitters have access to each of the other users' 'slow' fading information and the statistics of the 'fast' fading, but no knowledge of the instantaneous fast fading states. Assuming identical fast fading distributions for all users, it is found that the optimal strategy is to let at most one user transmit, with the user transmitting the one with the 'best' slow fading condition. An example with users undergoing lognormal shadowing and Rayleigh fast fading is considered, and capacity comparisons are made. Simple sub-optimal power control schemes which provide close to optimal performance in certain favorable channel conditions are also proposed and analysed.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114870235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On range matrices and wireless networks in d dimensions d维范围矩阵与无线网络
M. Desai, D. Manjunath
{"title":"On range matrices and wireless networks in d dimensions","authors":"M. Desai, D. Manjunath","doi":"10.1109/WIOPT.2005.33","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.33","url":null,"abstract":"Suppose that V = {v/sub 1/, v/sub 2/, ...v/sub n/} is a set of nodes randomly (uniformly) distributed in the d dimensional cube [0, x/sub 0/]/sup d/, and W = {w(i, j) > 0 : 1 /spl les/ i, j /spl les/ n} is a set of numbers chosen so that w(i, j) = w(j, i) = w(j, i). Construct a graph G/sub n,d,W/ whose vertex set is V, and whose edge set consists of all pairs {u/sub i/, u/sub j/} with /spl par/ u/sub i/ - u/sub j/ /spl par/ /spl les/ w(i, j). In the wireless network context, the set V is a set of labeled nodes in the network and W represents the maximum distances between the node pairs for them to be connected. We essentially address the following question: \"if G is a graph with vertex set V, what is the probability that G appears as a subgraph in G/sub n,d,W/?\" Our main contribution is a closed form expression for this probability under the l/sub /spl infin// norm for any dimension d and a suitably defined probability density function. As a corollary to the above answer, we also answer the question, \"what is the probability that Q/sub n,d,W/ is connected?\".","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129130661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Iterated local optimization for minimum energy broadcast 最小能量广播迭代局部优化
I. Kang, R. Poovendran
{"title":"Iterated local optimization for minimum energy broadcast","authors":"I. Kang, R. Poovendran","doi":"10.1109/WIOPT.2005.24","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.24","url":null,"abstract":"In our prior work, we presented a highly effective local search based heuristic algorithm called the largest expanding sweep search (LESS) to solve the minimum energy broadcast (MEB) problem over wireless ad hoc or sensor networks. In this paper, the performance is further strengthened by using iterated local optimization (ILO) techniques at the cost of additional computational complexity. To the best of our knowledge, this implementation constitutes currently the best performing algorithm among the known heuristics for MEB. We support this claim through extensive simulation study, comparing with globally optimal solutions obtained by an integer programming (IP) solver. For small network size up to 20 nodes, which is imposed by practical limitation of the IP solver, the ILO based algorithm produces globally optimal solutions with very high frequency (70%), and average performance is within 1.12% of the optimal solution.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128249806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A novel framework for radio resource management in IEEE 802.11 wireless LANs 一种新的IEEE 802.11无线局域网无线资源管理框架
M. Davis, Tristan Raimondi
{"title":"A novel framework for radio resource management in IEEE 802.11 wireless LANs","authors":"M. Davis, Tristan Raimondi","doi":"10.1109/WIOPT.2005.5","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.5","url":null,"abstract":"In this paper we address the need to characterize and quantify resource usage in IEEE 802.1 1 WLANs in order to support radio resource management. We present a compact and intuitive framework for performance characterization and resource utilization that is based upon the concept of MAC bandwidth components. These MAC bandwidth components are directly related to the transmission rate and serve to quantify the resource requirements associated with accessing the wireless medium. We also introduce a graphical technique for presenting these MAC bandwidth components that illustrates how WLAN stations interact in contending for access to the wireless medium. We demonstrate the usefulness of this framework for radio resource management using a number of computer simulations based upon the emerging IEEE 802.11e QoS standard.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130593509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Securing route optimisation in NEMO 确保NEMO中的航线优化
M. Calderón, C. Bernardos, M. Bagnulo, I. Soto
{"title":"Securing route optimisation in NEMO","authors":"M. Calderón, C. Bernardos, M. Bagnulo, I. Soto","doi":"10.1109/WIOPT.2005.45","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.45","url":null,"abstract":"The network mobility (NEMO) basic support protocol enables mobile networks to change their point of attachment to the Internet, while preserving established sessions of the nodes within the mobile network. When only a nonnested mobile network is considered, the so-called triangle routing is the main problem that should be faced. In mobile IPv6, the route optimisation mechanism solves this problem, and the return routability mechanism aims to limit the security concerns originated because of the route optimisation. Nowadays return routability is considered a weak solution (i.e., based on strong assumptions). In this article we explore different approaches to route optimisation in NEMO and we devise how to adapt some of the terminal mobility solutions to a NEMO environment, where, as we propose, a delegation of signalling rights from the mobile network node to the mobile router is necessary.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116659011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A simulated annealing algorithm for energy-efficient sensor network design 节能传感器网络设计的模拟退火算法
F. Lin, P. Chiu
{"title":"A simulated annealing algorithm for energy-efficient sensor network design","authors":"F. Lin, P. Chiu","doi":"10.1109/WIOPT.2005.7","DOIUrl":"https://doi.org/10.1109/WIOPT.2005.7","url":null,"abstract":"In this paper, we develop an algorithm to deploy an energy efficient sensor network such that it provides surveillance and target-positioning services. We consider to place K independent sets of sensors on a sensor field. These sets monitor the field in turn and work together when intrusion events occur. The lifetime of the sensor network is therefore prolonged up to K times. The problem is therefore a variant of the set K-cover problem, which is NP-complete. We formulate such sensor deployment problem, as a 0/1 integer programming problem. A simulated annealing based heuristic then is proposed for solving the optimization problem. The experimental results show that the proposed algorithm indicates a significant improvement in the sensor lifetime compared to the intuitive approach. Furthermore, the proposed algorithm is highly effective and efficient in terms of the overall deployment cost.","PeriodicalId":109366,"journal":{"name":"Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123929656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信